forked from aylac.top/nixcfg
this repo has no description

skibidi

Changed files
+55 -23
hosts
modules
snippets
tailnet
users
+12 -12
flake.lock
···
"nixpkgs": "nixpkgs"
},
"locked": {
-
"lastModified": 1755732626,
-
"narHash": "sha256-qLAElW0E2QmcrKAbLPjFdueAOpjp3HmlxaOQf4R4jas=",
+
"lastModified": 1755797736,
+
"narHash": "sha256-+rbFE7UqEx5FPoGMzqSltGnf5j0iqJUx8bgjHMMc61I=",
"owner": "9001",
"repo": "copyparty",
-
"rev": "cd8771fa522d1cf645c3c7e0193f07b53d81559c",
+
"rev": "6c76614eb1e805b7837e4e9294b842b9db6c3d1f",
"type": "github"
},
"original": {
···
]
},
"locked": {
-
"lastModified": 1755739851,
-
"narHash": "sha256-SC703bnPGOPWSEdZN2J2MkJWQBcUHV4QzuvFPdSVUME=",
+
"lastModified": 1755755322,
+
"narHash": "sha256-spCxkNihCk3uT3LUrUwzdEAjLA/E0EtEgF3KVI05nlM=",
"owner": "nix-community",
"repo": "home-manager",
-
"rev": "3c3510e61ca5c15a0f13d73c2232fa2d5478a86c",
+
"rev": "282b4c98de97da6667cb03de4f427371734bc39c",
"type": "github"
},
"original": {
···
},
"nixpkgs-unstable": {
"locked": {
-
"lastModified": 1755577059,
-
"narHash": "sha256-5hYhxIpco8xR+IpP3uU56+4+Bw7mf7EMyxS/HqUYHQY=",
+
"lastModified": 1755736253,
+
"narHash": "sha256-jlIQRypNhB1PcB1BE+expE4xZeJxzoAGr1iUbHQta8s=",
"owner": "NixOS",
"repo": "nixpkgs",
-
"rev": "97eb7ee0da337d385ab015a23e15022c865be75c",
+
"rev": "596312aae91421d6923f18cecce934a7d3bfd6b8",
"type": "github"
},
"original": {
···
"nixpkgs": "nixpkgs_4"
},
"locked": {
-
"lastModified": 1755729137,
-
"narHash": "sha256-eON36fTYYgAL1J/31FZfSyJzt+T9TFOn5p6P8ddyyqA=",
+
"lastModified": 1755797786,
+
"narHash": "sha256-+Qs6u9r2XwGjZGRHVbL1QV/3B4TZrE1ySdch9bHlMh0=",
"owner": "nix-community",
"repo": "NUR",
-
"rev": "c6508c49a36f20ea2d28920d1b5d55a48d072a4a",
+
"rev": "1b97ab0ba152bd2f4460a901cd7c44ebbacf7d6d",
"type": "github"
},
"original": {
+4 -4
hosts/morgana/default.nix
···
location = "/data/.swap";
};
-
#autoUpgrade = {
-
# enable = true;
-
# operation = "switch";
-
#};
+
autoUpgrade = {
+
enable = true;
+
operation = "switch";
+
};
};
desktop.gnome.enable = true;
services = {
+6
hosts/nanpi/glance.nix
···
icon = "di:jellyfin";
}
{
+
title = "Jellyseerr";
+
url = "https://${config.mySnippets.tailnet.networkMap.jellyseerr.vHost}/";
+
check-url = "http://${config.mySnippets.tailnet.networkMap.jellyseerr.hostName}:${toString config.mySnippets.tailnet.networkMap.jellyseerr.port}/";
+
icon = "di:jellyseerr";
+
}
+
{
title = "Sonarr";
url = "https://${config.mySnippets.tailnet.networkMap.sonarr.vHost}/";
check-url = "http://${config.mySnippets.tailnet.networkMap.sonarr.hostName}:${toString config.mySnippets.tailnet.networkMap.sonarr.port}/";
+15 -3
hosts/nanpi/services.nix
···
extraConfig = ''
bind tailscale/copyparty
encode zstd gzip
-
reverse_proxy ${config.mySnippets.tailnet.networkMap.copyparty.hostName}:${toString config.mySnippets.tailnet.networkMap.copyparty.port} {
-
flush_interval -1
-
}
+
reverse_proxy ${config.mySnippets.tailnet.networkMap.copyparty.hostName}:${toString config.mySnippets.tailnet.networkMap.copyparty.port}
'';
};
···
bind tailscale/miniflux
encode zstd gzip
reverse_proxy ${config.mySnippets.tailnet.networkMap.miniflux.hostName}:${toString config.mySnippets.tailnet.networkMap.miniflux.port}
+
'';
+
};
+
+
"${config.mySnippets.tailnet.networkMap.jellyseerr.vHost}" = {
+
extraConfig = ''
+
bind tailscale/jellyseerr
+
encode zstd gzip
+
reverse_proxy ${config.mySnippets.tailnet.networkMap.jellyseerr.hostName}:${toString config.mySnippets.tailnet.networkMap.jellyseerr.port}
'';
};
};
···
"everyone:message-to-ayla:wo"
];
};
+
};
+
+
jellyseerr = {
+
enable = true;
+
inherit (config.mySnippets.tailnet.networkMap.jellyseerr) port;
+
openFirewall = true;
};
copyparty = {
+6
modules/snippets/tailnet/default.nix
···
port = 6540;
vHost = "miniflux.${config.mySnippets.tailnet.name}";
};
+
+
jellyseerr = {
+
hostName = "nanpi";
+
port = 5055;
+
vHost = "jellyseerr.${config.mySnippets.tailnet.name}";
+
};
};
};
};
+6 -2
modules/users/ayla/default.nix
···
openssh.authorizedKeys.keyFiles =
lib.map (file: "${self.inputs.secrets}/publicKeys/${file}")
-
(lib.filter (file: (lib.hasPrefix "ayla_" file) || (lib.hasPrefix "root_morgana" file))
-
(builtins.attrNames (builtins.readDir "${self.inputs.secrets}/publicKeys")));
+
# right now this config is fine but if i ever get another machine i daily drive or a build server i need to do something else here
+
(lib.filter (file:
+
if config.networking.hostName == "morgana"
+
then "ayla_m23.pub" == file
+
else (lib.elem file ["ayla_morgana.pub" "ayla_23.pub"]))
+
(builtins.attrNames (builtins.readDir "${self.inputs.secrets}/publicKeys")));
uid = 1000;
shell = pkgs.fish;
+6 -2
modules/users/default.nix
···
users.root.openssh.authorizedKeys.keyFiles =
lib.map (file: "${self.inputs.secrets}/publicKeys/${file}")
-
(lib.filter (file: (lib.hasPrefix "ayla_" file) || (lib.hasPrefix "root_morgana" file))
-
(builtins.attrNames (builtins.readDir "${self.inputs.secrets}/publicKeys")));
+
# right now this config is fine but if i ever get another machine i daily drive or a build server i need to do something else here
+
(lib.filter (file:
+
if config.networking.hostName == "morgana"
+
then "ayla_m23.pub" == file
+
else (lib.elem file ["ayla_morgana.pub" "ayla_23.pub"]))
+
(builtins.attrNames (builtins.readDir "${self.inputs.secrets}/publicKeys")));
};
};
}